M. Backes, J. Camenisch, and D. Sommer, Anonymous yet accountable access control, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, 2005.
DOI : 10.1145/1102199.1102208

E. Bangerter, J. Camenisch, and A. Lysyanskaya, A Cryptographic Framework for the Controlled Release of Certified Data, Security Protocols Workshop, pp.20-42, 2004.
DOI : 10.1007/3-540-45682-1_31

P. Bichsel, J. Camenisch, T. Groß, and V. Shoup, Anonymous credentials on a standard java card, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.600-610, 2009.
DOI : 10.1145/1653662.1653734

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.668

S. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004.
DOI : 10.1145/1030083.1030103

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5041

J. Camenisch and I. Damgrd, Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes, Advances in Cryptology ASIACRYPT 2000, pp.331-345, 1976.
DOI : 10.1007/3-540-44448-3_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.3443

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.7938

J. Camenisch, S. Mödersheim, G. Neven, F. Preiss, and D. Sommer, A card requirements language enabling privacy-preserving access control, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.119-128, 2010.
DOI : 10.1145/1809842.1809863

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.654.3127

J. Camenisch, D. Sommer, and R. Zimmermann, A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures, SEC, pp.25-37, 2006.
DOI : 10.1007/0-387-33406-8_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.1081

S. Chari, P. Kermani, S. Smith, and R. Tassiulas, Security issues in m-commerce: A usage-based taxonomy. e-commerce agents, LNAI, pp.264-282, 2001.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690

J. Claessens, Analysis and design of an advanced infrastructure for secure and anonymous electronic payment systems on the Internet, 2002.

L. Danes, Smart Card Integration in the pseudonym system idemix, 2007.

K. Liao, W. Lee, M. Sung, and T. Lin, A One-Time Password Scheme with QR-Code Based on Mobile Phone, 2009 Fifth International Joint Conference on INC, IMS and IDC, pp.2069-2071, 2009.
DOI : 10.1109/NCM.2009.324

J. Louvel and T. Boileau, Restlet: Official Developer's Guide to Restful Web Applications in Java, Apress, 2010.

R. Mayrhofer and H. Gellersen, Shake Well Before Use: Authentication Based on Accelerometer Data, Pervasive Computing, pp.144-161, 2007.
DOI : 10.1007/978-3-540-72037-9_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9793

J. Mccune, A. Perrig, and M. Reiter, Seeing-Is-Believing: using camera phones for human-verifiable authentication, International Journal of Security and Networks, vol.4, issue.1/2, pp.43-56, 2009.
DOI : 10.1504/IJSN.2009.023425

W. Mostowski and P. Vullers, Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, 7th International ICST Conference on Security and Privacy in Communication Networks Proceedings, volume 96 of Lecture Notes of the Institute for ComputerSciences , Social-Informatics and Tele-communications Engineering (LNICST), pp.243-260, 2011.
DOI : 10.1007/3-540-45682-1_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.231.7868

L. Richardson and S. Ruby, RESTful web services. O'Reilly Series, 2007.

C. Soriente, G. Tsudik, and E. Uzun, HAPADEP: Human-Assisted Pure Audio Device Pairing, Information Security, pp.385-400, 2008.
DOI : 10.1007/978-3-540-85886-7_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.6927

G. Starnberger, L. Froihofer, and K. Goeschka, QR-TAN: Secure Mobile Transaction Authentication, 2009 International Conference on Availability, Reliability and Security, pp.578-583, 2009.
DOI : 10.1109/ARES.2009.96

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.2315

M. Sterckx, B. Gierlichs, B. Preneel, and I. Verbauwhede, Efficient implementation of anonymous credentials on Java Card smart cards, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.106-110, 2009.
DOI : 10.1109/WIFS.2009.5386474

A. Varshavsky, A. Scannell, A. Lamarca, and E. Lara, Amigo: Proximity-Based Authentication of Mobile Devices, Proceedings of the 9th international conference on Ubiquitous computing, UbiComp '07, pp.253-270, 2007.
DOI : 10.1007/978-3-540-74853-3_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.7188